The annual RSA Conference provides an opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. IBM is proud to serve as a gold sponsor of this year’s event.

Bringing the Security Immune System to Life

Talk with IBM Security’s subject matter experts, participate in innovative demos and experience the cognitive SOC — all without leaving the exhibition hall! Visit IBM throughout the RSA event at Booth #3535 North Hall.

On Feb. 14 in our booth, we are happy to be hosting two very special events:

2:45 – 3:45 p.m. – Bruce Schneier will be signing copies of his new book, Data and Goliath

Session Title:Advancing Information Risk PracticesDate/Time: February 13, 2017 | 8:30 a.m. – 11:30 a.m.Location: Moscone West 2024Speaker: Benjamin Edwards, Postdoctoral Researcher, IBM ResearchAbstract: Many challenges face today’s risk management programs, including how to rank risk security gaps, handle business interactions and form a qualified resource pool. This half-day seminar will be packed with useful information from a series of respected industry leaders who have set out to challenge conventional ideas and pursue cutting edge tactics.

Session Title:Regulating the Internet of ThingsDate/Time: February 14, 2017 | 1:15 p.m. – 2:00 p.m.Location: Marriott Marquis, Yerba Buena 5Speaker:Bruce Schneier, CTO, Resilient and Special Advisor to IBM SecurityAbstract: Computers and the Internet now affect the world in a direct physical manner. This transforms our industry from one that was largely benign to one that can cause great harm. Uniformly, harmful things are regulated, and the Internet will be no exception. Licenses, certifications, approvals and liabilities are all coming. We need to think about smart regulations now, before a disaster, or stupid regulations will be foisted on us.

Session Title:Find the Map, Get the Treasure, and Avoid Pirates — Data Security and Privacy Best PracticesDate/Time: February 15, 2017 | 8:00 a.m. – 8:45 a.m.Location: Moscone West | 2020Speaker:Cindy Compert, CTO Data Security & Privacy, IBMAbstract: The best practices of data security and privacy are like playing “Treasure Hunt.” Imagine yourself in a tropical paradise. You need to find and guard a cache of valuable buried treasure. Learn about these top 10 data security and privacy best practices based on working with hundreds of clients. We’ll cover tips, tricks and stories to help you find and guard your own “crown jewels” and keep pirates away.

Session Title:Internet of Insecurity: Can Industry Solve It or Is Regulation Required?Date/Time: February 15, 2017 | 8:00 a.m. – 8:45 a.m.Location: Moscone North | 130Speaker: Bruce Schneier, CTO, Resilient and Special Advisor to IBM SecurityAbstract: The rise of IoT has brought forth a new generation of devices and services representing significant innovation, yet all too many ship insecure and are not supported over their life. They have become proxies for abuse with a capacity for causing significant harm. Can we wait for industry and stakeholders to adopt trust frameworks and seal programs or do we need government to step in?

Session Title:Voice Privacy in the Enterprise: Are You Listening?Date/Time: February 15, 2017 | 9:15 a.m. – 10:00 a.m.Location: Moscone West | 2002Speaker:Diana Kelley, Executive Security Advisor, IBMAbstract: Society is quickly moving from the keyboard as a primary input device to using our own voices. Learn how voice-enabled IoT is changing the way we interact with devices and the security and privacy concerns that go along with it. Join a panel of experts to discuss what this means to businesses when employees bring devices to work.

Session Title:Applied Cognitive Security: Complementing the Security AnalystDate/Time: February 15, 2017 | 9:15 a.m. – 10:00 a.m.Location: Moscone North | 132Speakers:Vijay Dheap, Program Director – Cognitive Security, IBM & Brant Hale, Systems Analyst VI, SCANAAbstract: Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately.

Session Title:Getting Off the Hamster Wheel of TestingDate/Time: February 15, 2017 | 1:30 p.m. – 2:15 p.m.Location: Moscone West | 3018Speaker: Diana Kelley, Executive Security Advisor, IBMAbstract: Are you still just scanning for vulnerabilities and performing annual pen tests? Many providers make promises, but is the end product creating a false sense of security? Hear about the pros and cons of various testing techniques, learn to use them to identify threats and risks, and see examples from good and bad tests. It’s time to shake up security testing and take your testing to the next level.

Session Title: IoT End of Days – RSA TVDate/Time: February 15, 2017 | 2:40 p.m.Location: Moscone West | Level 3 viewing areaSpeaker:Charles Henderson, Global Head of X-Force Red, IBMAbstract: In the mad rush to sling electronics into the hands of consumers, developers and manufacturers are making it easier than ever to get enrolled into their IoT ecosystems. The time from sale to access is shorter than ever. The question is: Where do we go from there? This talk will analyze responsibly disclosed vulnerabilities in the next steps of identity management and access control in IoT.

Session Title: Charting the Course to GDPR — Setting SailDate/Time: February 16, 2017 | 8:00 a.m. – 8:45 a.m.Location: Moscone West | 3018Speaker: Cindy CompertAbstract: The new European Union General Data Protection Regulations take effect in May of 2018. Whether your organization is on EU soil or not, you may be subject to GDPR if you collect personal data on EU persons. GDPR will force major changes in how organizations secure, protect, share and manage personal data. Find out what GDPR means to your organization, what you can do to prepare and tools to help.

Session Title:IoT End of DaysDate/Time: February 17, 2017 | 10:15 a.m. – 11:00 a.m.Location: Moscone West 2002Speaker: Charles Henderson, Global Head of X-Force Red, IBMAbstract: In the mad rush to sling electronics into the hands of consumers, developers and manufacturers are making it easier than ever to get enrolled into their IoT ecosystems. The time from sale to access is shorter than ever. The question is: Where do we go from there? This talk will analyze responsibly disclosed vulnerabilities in the next steps of identity management and access control in IoT.